ignore security and it'll go away
Showing 1 - 25 of 45 RSS Feed

Files Date: 2009-12-22

Mandriva Linux Security Advisory 2009-339
Posted Dec 22, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-339 - Security issues were identified and fixed in Firefox 3.0.x. These include multiple unspecified vulnerabilities as well as memory corruption issues.

tags | advisory, vulnerability
systems | linux, mandriva
advisories | CVE-2009-3979, CVE-2009-3980, CVE-2009-3981, CVE-2009-3983, CVE-2009-3984, CVE-2009-3985, CVE-2009-3986, CVE-2009-3987
MD5 | a6ad896f11a4f588031f5afdf64ae186
Mandriva Linux Security Advisory 2009-338
Posted Dec 22, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-338 - Security issues were identified and fixed in Firefox 3.5.x. These include denial of service, code execution, integer overflows, and more.

tags | advisory, denial of service, overflow, code execution
systems | linux, mandriva
advisories | CVE-2009-3388, CVE-2009-3389, CVE-2009-3979, CVE-2009-3980, CVE-2009-3982, CVE-2009-3983, CVE-2009-3984, CVE-2009-3985, CVE-2009-3986, CVE-2009-3987
MD5 | c908340fc6b81d8cf64d2f703ade839a
PHP Open Chat 3.0.2 Cross Site Scripting
Posted Dec 22, 2009
Authored by Dedalo | Site seguridadblanca.org

PHP Open Chat version 3.0.2 suffers from cross site scripting and path disclosure vulnerabilities.

tags | exploit, php, vulnerability, xss
MD5 | f5871cc5fe949998813df22b49153531
WinScanX Password Utility
Posted Dec 22, 2009
Authored by Reed Arvin | Site windowsaudit.com

WinScanX is a Windows enumeration utility featuring over 20 options including the ability to identify easy-to-guess Windows passwords, the ability to identify easy-to-guess SNMP community strings, and the ability to locate and decrypt WinVNC passwords. Includes an optional GUI front-end.

systems | windows
MD5 | 46f9d4769513714550c3368066a2122d
The Uploader 2.0 Shell Upload
Posted Dec 22, 2009
Authored by Master Mind

The Uploader version 2.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | 733bbd2de6bb1bb97d14fddcecd4826d
JpGraph 3.0.6 Cross Site Scripting
Posted Dec 22, 2009
Authored by Martin Barbella

JpGraph version 3.0.6 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 356815a7ccde37e81e7842028bd4b226
Active PHP Bookmarks 1.3 SQL Injection
Posted Dec 22, 2009
Authored by Mr.Elgaarh | Site securityreason.com

Active PHP Bookmarks version 1.3 suffers from the same SQL injection vulnerability as previously discovered in version 1.1.02.

tags | exploit, php, sql injection
MD5 | 98ed1e0b03d5e9616cca290a3ad2f9ab
Active Business Directory 2 Cross Site Scripting
Posted Dec 22, 2009
Authored by Andrea Bocchetti | Site geekit.it

Active Business Directory version 2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 56486722ce5a1455f471324aa589079d
paFileDB 3.1 Cross Site Scripting
Posted Dec 22, 2009
Authored by ViRuS_HiMa

paFileDB version 3.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | d7ca3b8f94ee6331c1408b64c9931b40
The Uploader 2.0 File Disclosure
Posted Dec 22, 2009
Authored by Stack | Site v4-team.com

The Uploader version 2.0 suffers from a remote file disclosure vulnerability.

tags | exploit, remote, info disclosure
MD5 | 9f1f8af8e226b84d8d6c19e51d8d276a
HP Security Bulletin HPSBUX02498 SSRT090264
Posted Dec 22, 2009
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP-UX running Apache v2.0.59.12 and earlier. The vulnerability could be exploited remotely to inject unauthorized data or to create a Denial of Service (DoS).

tags | advisory, denial of service
systems | hpux
advisories | CVE-2009-3555
MD5 | eb14291fa3cba78bc377f52980cd43a7
CoolPlayer 2.18 .M3U Buffer Overflow
Posted Dec 22, 2009
Authored by data$hack

CoolPlayer version 2.18 buffer overflow exploit that creates a malicious .m3u file.

tags | exploit, overflow
MD5 | 9c5cf20cc2f8657b3c2c089e278613d9
Mandriva Linux Security Advisory 2009-337
Posted Dec 22, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-337 - The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a plaintext injection attack, aka the Project Mogul issue. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. This update fixes this vulnerability.

tags | advisory, web, protocol
systems | linux, mandriva
advisories | CVE-2009-3555
MD5 | 027b081b8a55a4632ceaa9261ccc8dd1
DeluxeBB 1.3 XSS / Bypass
Posted Dec 22, 2009
Authored by cp77fk4r

DeluxeBB versions 1.3 and below suffer from cross site scripting, unprotected administrative panels, and disclosure vulnerabilities.

tags | exploit, vulnerability, xss, add administrator, bypass
MD5 | 437ed9903983bffa3b692113064a27f9
Clark Connect Cross Site Scripting
Posted Dec 22, 2009
Authored by Edgard Chammas

Clark Connect suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 8a6a08a8ee54c920b064c32e4198a56d
GNU Privacy Guard 2.0.14
Posted Dec 22, 2009
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: The default for "--include-cert" is now to include all certificates in the chain except for the root certificate. Numerical values may now be used as an alternative to the debug-level keywords. The GPGSM "--audit-log" feature is now more complete. A new GPGSM option "--ignore-cert-extension" was added. New and changed passphrases are now created with an iteration count requiring about 100ms of CPU work.
tags | encryption
MD5 | 54732a0a76d59646b7e0b682fb357c22
MyPage 0.4 Local File Inclusion
Posted Dec 22, 2009
Authored by Baybora

MyPage version 0.4 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | e64d483d0217720b9e37d271c545762d
Mini File Host 1.5 Shell Upload
Posted Dec 22, 2009
Authored by Mr.Z

Mini File Host version 1.5 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell, file upload
MD5 | f0e9828d00d73680f97336941ab2fee5
Easy RM To MP3 27.3.700 Buffer Overflow
Posted Dec 22, 2009
Authored by d3b4g

Easy RM To MP3 version 2.7.3.700 buffer overflow exploit for WinXP SP3 that creates a malicious .m3u file.

tags | exploit, overflow
systems | windows
MD5 | cc07e1953c8c81b0f2cbaacda175a452
PlayMeNow .M3U Universal Buffer Overflow
Posted Dec 22, 2009
Authored by ThE g0bL!N

PlayMeNow universal local buffer overflow SEH exploit that creates a malformed .m3u file.

tags | exploit, overflow, local
MD5 | 2eb94ed3b79abcd7eb0ab2d1ea8b472c
Adobe Reader / Acrobat Use-After-Free Calc.exe
Posted Dec 22, 2009
Authored by Ahmed Obied

Proof of concept code that generates a PDF file to be loaded by Adobe Reader or Acrobat. It demonstrates a use-after-free vulnerability by spawning calc.exe.

tags | exploit, proof of concept
advisories | CVE-2009-4324
MD5 | 81173eb4bc40d9297a166b2c0e9b76c4
Secunia Security Advisory 37887
Posted Dec 22, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Absolute Shopping Cart, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | e2d3e82236a9e3345ac535e4dba6ab45
Secunia Security Advisory 37806
Posted Dec 22, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for libtool. This fixes a security issue, which can be exploited by malicious, local users to potentially gain escalated privileges.

tags | advisory, local
systems | linux, fedora
MD5 | 25d95e4a01939760850c5df4a3427576
Secunia Security Advisory 37812
Posted Dec 22, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for asterisk. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, fedora
MD5 | f909f7bf65bb05a84f0ef322c3699ea8
Secunia Security Advisory 37766
Posted Dec 22, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Condor, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
MD5 | a80d051c9fabd1959a8721f429b2d4ff
Page 1 of 2
Back12Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close